A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Freeimage Project
Freeimage Project freeimage |
|
CPEs | cpe:2.3:a:freeimage_project:freeimage:*:*:*:*:*:*:*:* | |
Vendors & Products |
Freeimage Project
Freeimage Project freeimage |
|
Metrics |
ssvc
|
Fri, 27 Sep 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service. | A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service. |
Fri, 27 Sep 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service. | |
Title | Freeimage: heap buffer overflow in tiff_read_iptc_profile | |
Weaknesses | CWE-126 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fedora
Published: 2024-09-27T06:51:07.624Z
Updated: 2024-09-27T14:32:22.293Z
Reserved: 2024-09-20T04:18:06.021Z
Link: CVE-2024-9029
Vulnrichment
Updated: 2024-09-27T14:32:18.515Z
NVD
Status : Awaiting Analysis
Published: 2024-09-27T07:15:05.800
Modified: 2024-09-30T12:46:20.237
Link: CVE-2024-9029
Redhat
No data.